EP1652042A2 - San/storage self-healing/capacity planning system and method - Google Patents
San/storage self-healing/capacity planning system and methodInfo
- Publication number
- EP1652042A2 EP1652042A2 EP04778240A EP04778240A EP1652042A2 EP 1652042 A2 EP1652042 A2 EP 1652042A2 EP 04778240 A EP04778240 A EP 04778240A EP 04778240 A EP04778240 A EP 04778240A EP 1652042 A2 EP1652042 A2 EP 1652042A2
- Authority
- EP
- European Patent Office
- Prior art keywords
- policies
- storage device
- reserved
- computer storage
- resource
- Prior art date
- Legal status (The legal status is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the status listed.)
- Ceased
Links
Classifications
-
- G—PHYSICS
- G06—COMPUTING; CALCULATING OR COUNTING
- G06F—ELECTRIC DIGITAL DATA PROCESSING
- G06F3/00—Input arrangements for transferring data to be processed into a form capable of being handled by the computer; Output arrangements for transferring data from processing unit to output unit, e.g. interface arrangements
- G06F3/06—Digital input from, or digital output to, record carriers, e.g. RAID, emulated record carriers or networked record carriers
- G06F3/0601—Interfaces specially adapted for storage systems
- G06F3/0628—Interfaces specially adapted for storage systems making use of a particular technique
- G06F3/0629—Configuration or reconfiguration of storage systems
- G06F3/0637—Permissions
-
- G—PHYSICS
- G06—COMPUTING; CALCULATING OR COUNTING
- G06F—ELECTRIC DIGITAL DATA PROCESSING
- G06F3/00—Input arrangements for transferring data to be processed into a form capable of being handled by the computer; Output arrangements for transferring data from processing unit to output unit, e.g. interface arrangements
- G06F3/06—Digital input from, or digital output to, record carriers, e.g. RAID, emulated record carriers or networked record carriers
- G06F3/0601—Interfaces specially adapted for storage systems
- G06F3/0602—Interfaces specially adapted for storage systems specifically adapted to achieve a particular effect
- G06F3/062—Securing storage systems
- G06F3/0622—Securing storage systems in relation to access
-
- G—PHYSICS
- G06—COMPUTING; CALCULATING OR COUNTING
- G06F—ELECTRIC DIGITAL DATA PROCESSING
- G06F3/00—Input arrangements for transferring data to be processed into a form capable of being handled by the computer; Output arrangements for transferring data from processing unit to output unit, e.g. interface arrangements
- G06F3/06—Digital input from, or digital output to, record carriers, e.g. RAID, emulated record carriers or networked record carriers
- G06F3/0601—Interfaces specially adapted for storage systems
- G06F3/0668—Interfaces specially adapted for storage systems adopting a particular infrastructure
- G06F3/067—Distributed or networked storage systems, e.g. storage area networks [SAN], network attached storage [NAS]
-
- H—ELECTRICITY
- H04—ELECTRIC COMMUNICATION TECHNIQUE
- H04L—TRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
- H04L41/00—Arrangements for maintenance, administration or management of data switching networks, e.g. of packet switching networks
- H04L41/14—Network analysis or design
- H04L41/145—Network analysis or design involving simulating, designing, planning or modelling of a network
-
- H—ELECTRICITY
- H04—ELECTRIC COMMUNICATION TECHNIQUE
- H04L—TRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
- H04L67/00—Network arrangements or protocols for supporting network services or applications
- H04L67/01—Protocols
- H04L67/10—Protocols in which an application is distributed across nodes in the network
- H04L67/1097—Protocols in which an application is distributed across nodes in the network for distributed storage of data in networks, e.g. transport arrangements for network file system [NFS], storage area networks [SAN] or network attached storage [NAS]
Definitions
- TECHNICAL FIELD This application relates to storage area network management .
- BACKGROUND The main fear with storage administrators is the loss of data in business applications resulting in system-wide outages. To restore the data would be costly.
- storage management needs to be made easy for storage administrators, for instance, user friendly to those that may be less experienced in storage administration and to cover the lack of knowledge, if provisioning actions are very user friendly, mistakes can be made more readily as well.
- drag and drop provisioning is a very popular feature in SAN administration, reducing the complexity of managing a SA ⁇ . However, it is also easy to make a mistake using a drag and drop feature .
- a storage management system and method that is user friendly and easy to use, but also allow for tighter control so that mistakes are not made easily or to quickly detect and counteract the mistakes, are desirable .
- Another area of desirable improvement is the ability to integrate SAN design tools with the SAN management tools. For example, SAN designer technology is available that allows storage administrators or users to setup policies that they desire. It would be desirable to have an import tool that imports the policies for instance, designed through SAN designer technology, into the SAN manager such that SAN manager would capture the intent of the storage administrator, and automatically provision the policies.
- Yet another area of desirable improvement stems from the assumption that storage administrators need similar control over their environment the same way as the system administrators in the IT (information technology) world.
- the storage administrators need to assure that their systems are readily available for business. They cannot afford errors or if there are problems, need to be able to determine very quickly what happened.
- the current provisioning tools are lacking a mechanism for change control. Therefore, it is desirable to have a system and method that would allow a storage administrator to quickly determine and/or have control over what occurs in the SAN. For instance, customer' s systems may accidentally gain access to restricted volumes and cause outages. Without proper control, it may be difficult for the customer to track what had changed and what action eventually caused the problem. Although guesses can be made as to the source of the problem, for instance, a bad LUN masking operation, there may be no record or proof of it. Thus, there is a need for change control, even in small SAN environments.
- the system in one aspect comprises one or more policy wizard modules operable to setup one or more policies associated with one or more computer storage device resources.
- a conformance policy checker is operable to check for conformance of the one or more policies in response to receiving one or more events associated with the one or more computer storage device resources.
- the conformance policy checker is further operable to invoke one or more enforcement rules associated with one or more policies, if any, if a violation of the one or more policies is detected.
- the method in one aspect comprises allowing one or more policies to be reserved for one or more computer storage device resources, receiving an event associated with the one or more computer storage device resources, checking that a computer storage device resource associated with the event received conforms to the reserved one or more policies, and if the computer storage device resource associated with the event received does not conform to the reserved one or more policies, invoking an enforcement rule associated with the reserved one or more policies.
- Fig. 2 illustrates an example listing of resource classes, their supported policies and their hierarchies.
- Fig. 3, Fig. 4, and Fig. 5 illustrate resource class hierarchy diagram for switch ports, disk array ports, and LUN/RAID group/Spindle resources respectively.
- Fig. 6 illustrates a flow diagram for the policy conformance checker in one embodiment .
- the system and method of the present disclosure in one embodiment allows storage administrators to discover, monitor, and administer their networked storage based environment .
- the system and method of the present disclosure in one embodiment provide SAN (storage area network) capacity planning and self-healing policies that enable a SAN administrator to reserve SAN resources for future usage, ensure that resources are properly allocated, and for change control, that is, capture events that occur in the SA ⁇ to monitor and control changes occurring.
- SA ⁇ capacity planning and self- healing policies may be implemented as an integrated function of an existing SA ⁇ managers, or alternatively, as a stand along program that, for instance, can communicate with an existing SA ⁇ managing components.
- the policies of the present disclosure enable the storage or SA ⁇ administrator to pre-allocate resources and enforce their proper distribution.
- SA ⁇ provisioning policies allow the user to specify by application or host how new disk space should be allocated once it is requested.
- an administrator may want an application to have RAIDO+1 types of LU ⁇ s , which means that the volume shall be locally mirrored and remotely replicated.
- RAID refers to redundant array of independent disks.
- LU ⁇ refers to logical unit number, for example, used, for example, to identify SCSI devices so that host can address and access the data on each disk drive in an array.
- the policies are a set of error checks and reservation guidelines implemented as properties in the Common Services CORE (Worldview repository) for every SA ⁇ resource.
- the resources supported may include switch ports, storage ports, RAID (redundancy array of independent disks) volumes, and RAID spindles.
- Examples for reservation policies may include reserve by application, list of hosts, operating system, storage type (tape or disk), RAID model, and World Wide Name.
- the reservation policies are hierarchically structured to allow very generic down to very specific reservation of resources.
- the policies have a set of predefined enforcement actions.
- An example of an enforcement action may be the prevention of the resource allocation. Combined with change monitoring / events and integrated into administrative actions, these policies allow the SAN / Storage to be laid out the way the storage administrator intended them to be.
- the policies are designed to warn of policy violations coupled with SAN resource specific enforcement actions, for example, to prevent costly errors.
- SAN / storage administrators may be enabled to plan ahead as well as get control over a complex environment, for instance, by defining policies for the SAN layout / plan as desired.
- Fig. 1 is an architectural diagram illustrating the components of the system of the present disclosure in one embodiment.
- Policy wizards are Java based in one embodiment, and may be made available through a commercially available SAN Explorer and SAN Manager products, for instance, as a separate global policy with tabs for every resource class from an available SAN Manager product start menu.
- the policy wizards may also be available through the SAN Manager products' portal. as well.
- An example of a policy resource wizard is a dynamic resource allocation wizard 102, which specifies the type of volume an application should be automatically assigned when provisioning new disk space.
- resource classes utilized by the dynamic resource allocation wizard may include application, logical volume, and host 108.
- Another example of a policy resource wizard is a switch port reservation wizard 104, which specifies what a port should be connected to in the future .
- An example of a resource class utilized by the switch port reservation wizard is a switch port 108.
- Yet another example of a policy resource wizard is a storage pool setup wizard 106, which allows a user to reserve unused storage according to capacity planning rules. For example a list of spindles could be reserved for a list of hosts.
- resource allocation policies are resource class dependent.
- the following resource classes have policies defined: Applications, Logical Volumes, Hosts, Switch Ports, Disk array ports, LUNs / RAIDgroups / Spindles 108. Different types of policies may exist depending on the resource type.
- Self-healing / resource planning policies type has enforcement rules defined, and addresses resources such as Switch Ports, Disk array ports, LUNs / RAIDgroups / Spindles.
- Zoning policies type also has enforcement rules defined, and addresses resources such as Switch Ports, RAID ports, Logical/Physical Volumes. Resource planning / self-healing policies have enforcement actions that can be invoked when policy violations occur.
- a disabling method is available that prevents an erroneous resource allocation.
- An example of a preventive action for resources such as the switch port may be an action that disables the ports.
- An example of a preventive action for resources such as the Disk Array ports may be an action that zones out port and/or disables the connected switch port .
- An example of a preventive action for resources such as the LUNs / RAIDgroups / Spindles may be an action that masks out the LUN.
- Additional enforcement rules are available for all of these objects, for instance, in case the administrator only wishes to be notified of policy violations or would like to switch a particular policy off for testing, etc. These additional enforcement rules may include: Do nothing; Send warning message. Other enforcement actions may also send warning messages as well . The default enforcement action may be set to "Send warning message" for all self-healing policies. These messages can be used to institute user customized actions to react ⁇ to policy violations through an available event management system. For example, an administrator may send an e-mail or a wireless message, for instance, coupled to the SAN manager, to a system's event management system, which would initiate its own actions based on the message (event) received.
- the policy rules and enforcement actions are stored within the Common Services Worldview Repository (CORE) as properties to their corresponding resource classes .
- a policy conformance checker 110 checks for proper conformance. For instance, for resource capacity planning, self-healing policies there is a conformance check by resource class. For each class a conformance check method is made available through a runtime dll. The following conformance checks are defined: Check switch port for reservation conformance; Check RAID port for reservation conformance; Check LUN for reservation conformance; Check RAIDgroup for reservation conformance; Check Spindle for reservation conformance . For zoning policies , the conformance check is checked whenever a zone change occurs .
- the hierarchy for zoning policies is not within the protected resources but in the hierarchy of objects on which level zoning can be defined, for example, fabric, switch, switch port level.
- Examples of checks in these policies are: Check zone for fabric zoning policy (no zoning, hard, soft zones, zone by node, zone by fcid) ; Check zone for switch zoning policy (no zoning, hard, soft zones, zone by node, zone by fcid) ; Check zone for port zoning policy (no zoning, hard, soft zones, zone by node, zone by fcid) .
- the system and method of the present disclosure also may include policy reports, for example, generated by a policy reporter 112. Policy reports about future allocation keep the user informed about pending policies.
- an overall status report provides details about existing policies as well as possible conflicts. Capacity / utilization reports may be updated to include reserved capacity / utilization. A report of all past policy violations may also be available.
- the policy conformance checker 110 can be implemented as a runtime library, and integrated into active SAN discovery, zone manager, and storage manager components. These components are responsible for generating intelligent configuration change events. Whenever anything in the SAN changes, for example a new device is added, or the active zone set of a fabric changes, a new LUN is created and made available, the conformance checks are launched.
- Fig. 6 illustrates a flow diagram for the policy conformance checker in one embodiment. At 602, switch port for reservation conformance is checked, for example, when a configuration change event is detected in one or more switch ports.
- RAID port for reservation conformance is checked, for example, when a configuration change event is detected in one or more RAID ports.
- LUN for reservation conformance is checked, for example, when a configuration change event is detected in one or more LUNs.
- RAIDgroup for reservation conformance is checked, for example, when a configuration change event is detected in one or more RAIDgroups.
- Spindle for reservation conformance is checked, for example, when a configuration change event is detected in one or more Spindles.
- further zoning conformance check may be performed, for example, when a zone change occurs.
- Example of zone checking include fabric zoning policy check, switch zoning policy check, and port zoning policy check.
- the system and method of the present disclosure accommodates the policies on different platforms, for instance, since how the policies are implemented may depend on different default device behavior. For example on some director type switches the default behavior for zoning disabled is that no device can see the other. On others, if no zones are enabled all the devices have access to each other. For disk arrays there are a couple of different behaviors in creating, masking, and exporting LU s. On some arrays for example LUNs will be mapped to all ports when exported. On some disk array the LUN number is global, on some it is not. For example, on high end disk arrays LUN 0 on port 1 is not the same as LUN 0 on port 2. These disk arrays usually have an LDEV (logical device) concept.
- LDEV logical device
- an LDEV is mapped 1:1 to a RAID group.
- An LDEV can be mapped to several ports (l:n relationship) .
- the LUN is usually mapped to the RAID group directly.
- the conformance checker adjusts to these different layouts.
- the access check functions have device properties defined and use them accommodate these differences.
- Some examples of access check properties are: Switches: ⁇ oZoningByDefaultVisible Boolean FibreTrunkingSupported Boolean Disk Arrays : LU ⁇ sMaskedByDefault - Boolean LU ⁇ sMappedToAllPortsByDefault - Boolean LDEVSupported Boolean
- these properties are made available as properties to the corresponding resource classes such as switches, storage subsystems, in the CORE (Worldview repository) as well. In one embodiment, these properties are read-only.
- Fig. 2 illustrates an example listing of resource classes, their supported policies and their hierarchies, that is, a list of policy types and enforcement actions for a plurality of resources. In one embodiment, reservations are saved through properties in the matching resource WV classes.
- Examples of the identifiers of the various reservation methods are range of hosts, host that may include IP (Internet Protocol) address (WV address property) , WV name property, UUID of object in WV; Cluster, which may include IP address (WV address property) , WV name property, UUID of object in WV; WorldWideName, which may induce portWWN (WV property of all fibre channel port types) , nodeWWN (WV property of StorageSubsystems, HBAs, TapeSubsystems) , UUID of port; Operating System, which may include class name of WV host (e.g. Windows2000Server) ; Logical Volume and/or Physical Volume, which may include Name of WV object, UUID of WV object .
- Fig. 3 Fig.
- Fig. 5 illustrate resource class hierarchy diagram for switch ports, disk array ports, and LUN/RAID group/Spindle resources respectively. All classes in Worldview which are corresponding to the resource classes may be updated by the following properties : PolicyReservationHierarchy : String PolicyEnforcementAction: String
- the policy wizards may gather the resource allocation of the user through selection screens. Reservation hierarchy string is then created, the resource is mapped to the corresponding Worldview class, and the reservation properties are filled. The policy wizards may fill in the reservation hierarchy property by, for example, using a grammar to express the tree branch that has been traversed to reserve a resource.
- the PolicyReservationHierarchy property may look like this: Initiator : RangeOfHosts ⁇ xxx . xxx.xxx.xxx ⁇ : ogicalVolu e : C; or Initiator : Cluster : ⁇ xxx. xx.
- the reservation hierarchy grammar may have the following rules: tree nodes are separated by ⁇ A"; if a tree node has an identifier assigned then the identifying property is listed with w ⁇ " and x ⁇ " and is separated by ","; The reservation hierarchy can be cut off at any level in the tree. In one embodiment, only one tree branch is used to reserve a resource.
- the system and method of the present disclosure enables administrators to automatically import SAN policies designed through SAN designer technology. For instance, SAN Manager can tie into the original design intends of the user. Users can design their SAN in Visio through SAN Designer.
- An import tool from SAN Designer may allow SAN Manager to capture the intent of the storage administrator.
- the import utility sets up the reservation policies according to the SAN Designer layout. For example, if a specific disk array is connected to one switch port, SAN Manager reserves this switch port for storage and the vendor/model that was specified. At the same time SAN Manager checks, if the already connected ports match the SA ⁇ design. A report may be launched that warns the user of all inconsistencies. In the case where a port is not connected and reserved for future usage, SA ⁇ Manager waits until a port comes online and then run the policy checks accordingly. If enforcement actions were set SAN Manager could disable the port from being put online whenever there are policy violations.
- the system and method of the present disclosure utilized configuration events that SA ⁇ Manager is able to capture.
- the system and method of the present disclosure detects a configuration change event even if the change was made through another tool but their own. For example, a user could use an element manager of a switch or disk array to activate a new zone set or create a new LUN.
- the SAN Manager of the present disclosure in one embodiment, supplies the event and is able to counteract its negative effects even though the change was not made through its own tools.
- the self-healing and capacity planning policies of the present disclosure in one embodiment allows the user to reserve all SAN resources such as switch port, disk array port, LUNs, RAID groups, or spindles before actual provisioning action is performed.
- SAN manager for example, all zone configuration and connectivity changes, all LUN configuration changes, all the events necessary to trigger policy checks and enforcement actions are detected and acted upon according to the policy provisioning of the present disclosure.
- policies are enforced.
- the system and method of the present disclosure may be implemented and run on a general-purpose computer.
Landscapes
- Engineering & Computer Science (AREA)
- Theoretical Computer Science (AREA)
- Human Computer Interaction (AREA)
- Physics & Mathematics (AREA)
- General Engineering & Computer Science (AREA)
- General Physics & Mathematics (AREA)
- Computer Networks & Wireless Communication (AREA)
- Signal Processing (AREA)
- Information Retrieval, Db Structures And Fs Structures Therefor (AREA)
- Exchange Systems With Centralized Control (AREA)
Abstract
Description
Claims
Applications Claiming Priority (2)
Application Number | Priority Date | Filing Date | Title |
---|---|---|---|
US48679003P | 2003-07-11 | 2003-07-11 | |
PCT/US2004/022635 WO2005008439A2 (en) | 2003-07-11 | 2004-07-12 | San/storage self-healing/capacity planning system and method |
Publications (2)
Publication Number | Publication Date |
---|---|
EP1652042A2 true EP1652042A2 (en) | 2006-05-03 |
EP1652042A4 EP1652042A4 (en) | 2009-03-04 |
Family
ID=34079302
Family Applications (1)
Application Number | Title | Priority Date | Filing Date |
---|---|---|---|
EP04778240A Ceased EP1652042A4 (en) | 2003-07-11 | 2004-07-12 | San/storage self-healing/capacity planning system and method |
Country Status (3)
Country | Link |
---|---|
US (1) | US8261037B2 (en) |
EP (1) | EP1652042A4 (en) |
WO (1) | WO2005008439A2 (en) |
Families Citing this family (56)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
US8965936B2 (en) * | 2004-02-26 | 2015-02-24 | Comcast Cable Holdings, Llc | Method and apparatus for allocating client resources to multiple applications |
CA2558892A1 (en) | 2004-03-13 | 2005-09-29 | Cluster Resources, Inc. | System and method for a self-optimizing reservation in time of compute resources |
US8782654B2 (en) | 2004-03-13 | 2014-07-15 | Adaptive Computing Enterprises, Inc. | Co-allocating a reservation spanning different compute resources types |
US7617303B2 (en) * | 2004-04-27 | 2009-11-10 | At&T Intellectual Property Ii, L.P. | Systems and method for optimizing access provisioning and capacity planning in IP networks |
US20070266388A1 (en) | 2004-06-18 | 2007-11-15 | Cluster Resources, Inc. | System and method for providing advanced reservations in a compute environment |
US8176490B1 (en) | 2004-08-20 | 2012-05-08 | Adaptive Computing Enterprises, Inc. | System and method of interfacing a workload manager and scheduler with an identity manager |
JP2006106993A (en) * | 2004-10-04 | 2006-04-20 | Hitachi Ltd | Method of managing reservation of storage and storage management system |
CA2827035A1 (en) | 2004-11-08 | 2006-05-18 | Adaptive Computing Enterprises, Inc. | System and method of providing system jobs within a compute environment |
US8863143B2 (en) | 2006-03-16 | 2014-10-14 | Adaptive Computing Enterprises, Inc. | System and method for managing a hybrid compute environment |
US8782231B2 (en) | 2005-03-16 | 2014-07-15 | Adaptive Computing Enterprises, Inc. | Simple integration of on-demand compute environment |
US9015324B2 (en) | 2005-03-16 | 2015-04-21 | Adaptive Computing Enterprises, Inc. | System and method of brokering cloud computing resources |
US9231886B2 (en) | 2005-03-16 | 2016-01-05 | Adaptive Computing Enterprises, Inc. | Simple integration of an on-demand compute environment |
US8782120B2 (en) | 2005-04-07 | 2014-07-15 | Adaptive Computing Enterprises, Inc. | Elastic management of compute resources between a web server and an on-demand compute environment |
CA2603577A1 (en) | 2005-04-07 | 2006-10-12 | Cluster Resources, Inc. | On-demand access to compute resources |
US7548963B2 (en) | 2005-07-09 | 2009-06-16 | International Business Machines Corporation | System and method for generating a multi-plan for a multi-layer storage area network |
US20070021786A1 (en) * | 2005-07-25 | 2007-01-25 | Cyberonics, Inc. | Selective nerve stimulation for the treatment of angina pectoris |
US20070027497A1 (en) * | 2005-07-27 | 2007-02-01 | Cyberonics, Inc. | Nerve stimulation for treatment of syncope |
US20070079097A1 (en) * | 2005-09-30 | 2007-04-05 | Emulex Design & Manufacturing Corporation | Automated logical unit creation and assignment for storage networks |
US20070101000A1 (en) * | 2005-11-01 | 2007-05-03 | Childress Rhonda L | Method and apparatus for capacity planning and resourse availability notification on a hosted grid |
US7953928B2 (en) * | 2007-02-22 | 2011-05-31 | Network Appliance, Inc. | Apparatus and a method to make data sets conform to data management policies |
US20080208926A1 (en) * | 2007-02-22 | 2008-08-28 | Smoot Peter L | Data management in a data storage system using data sets |
US8041773B2 (en) | 2007-09-24 | 2011-10-18 | The Research Foundation Of State University Of New York | Automatic clustering for self-organizing grids |
US8321867B1 (en) * | 2008-01-24 | 2012-11-27 | Network Appliance, Inc. | Request processing for stateless conformance engine |
US8886909B1 (en) * | 2008-03-31 | 2014-11-11 | Emc Corporation | Methods, systems, and computer readable medium for allocating portions of physical storage in a storage array based on current or anticipated utilization of storage array resources |
US8112661B1 (en) * | 2009-02-02 | 2012-02-07 | Netapp, Inc. | Method and system for changing a protection policy for a dataset in a network storage system |
US8856481B1 (en) * | 2009-09-17 | 2014-10-07 | Emc Corporation | Data processing system having host-controlled provisioning of data storage resources |
US11720290B2 (en) | 2009-10-30 | 2023-08-08 | Iii Holdings 2, Llc | Memcached server functionality in a cluster of data processing nodes |
US10877695B2 (en) | 2009-10-30 | 2020-12-29 | Iii Holdings 2, Llc | Memcached server functionality in a cluster of data processing nodes |
US8380852B2 (en) * | 2009-12-23 | 2013-02-19 | International Business Machines Corporation | Clearing SCSI reservations for non-detectable initiators for extended duration |
US8924681B1 (en) | 2010-03-31 | 2014-12-30 | Emc Corporation | Systems, methods, and computer readable media for an adaptative block allocation mechanism |
US9311002B1 (en) | 2010-06-29 | 2016-04-12 | Emc Corporation | Systems, methods, and computer readable media for compressing data at a virtually provisioned storage entity |
US8745327B1 (en) | 2011-06-24 | 2014-06-03 | Emc Corporation | Methods, systems, and computer readable medium for controlling prioritization of tiering and spin down features in a data storage system |
US9071644B2 (en) * | 2012-12-06 | 2015-06-30 | International Business Machines Corporation | Automated security policy enforcement and auditing |
US9547429B1 (en) * | 2013-05-28 | 2017-01-17 | Ca, Inc. | Visualized storage provisioning |
US9246935B2 (en) | 2013-10-14 | 2016-01-26 | Intuit Inc. | Method and system for dynamic and comprehensive vulnerability management |
US9501345B1 (en) | 2013-12-23 | 2016-11-22 | Intuit Inc. | Method and system for creating enriched log data |
US9323926B2 (en) | 2013-12-30 | 2016-04-26 | Intuit Inc. | Method and system for intrusion and extrusion detection |
US9325726B2 (en) | 2014-02-03 | 2016-04-26 | Intuit Inc. | Method and system for virtual asset assisted extrusion and intrusion detection in a cloud computing environment |
US20150304343A1 (en) | 2014-04-18 | 2015-10-22 | Intuit Inc. | Method and system for providing self-monitoring, self-reporting, and self-repairing virtual assets in a cloud computing environment |
US10462210B2 (en) | 2014-02-13 | 2019-10-29 | Oracle International Corporation | Techniques for automated installation, packing, and configuration of cloud storage services |
US10121007B2 (en) | 2014-02-21 | 2018-11-06 | Intuit Inc. | Method and system for providing a robust and efficient virtual asset vulnerability management and verification service |
US9866581B2 (en) | 2014-06-30 | 2018-01-09 | Intuit Inc. | Method and system for secure delivery of information to computing environments |
US10757133B2 (en) | 2014-02-21 | 2020-08-25 | Intuit Inc. | Method and system for creating and deploying virtual assets |
US9276945B2 (en) | 2014-04-07 | 2016-03-01 | Intuit Inc. | Method and system for providing security aware applications |
US9298927B2 (en) | 2014-02-27 | 2016-03-29 | Intuit Inc. | Method and system for providing an efficient vulnerability management and verification service |
US9245117B2 (en) | 2014-03-31 | 2016-01-26 | Intuit Inc. | Method and system for comparing different versions of a cloud based application in a production environment using segregated backend systems |
US9516044B2 (en) | 2014-07-31 | 2016-12-06 | Intuit Inc. | Method and system for correlating self-reporting virtual asset data with external events to generate an external event identification database |
US11294700B2 (en) | 2014-04-18 | 2022-04-05 | Intuit Inc. | Method and system for enabling self-monitoring virtual assets to correlate external events with characteristic patterns associated with the virtual assets |
US9374389B2 (en) | 2014-04-25 | 2016-06-21 | Intuit Inc. | Method and system for ensuring an application conforms with security and regulatory controls prior to deployment |
US9900322B2 (en) | 2014-04-30 | 2018-02-20 | Intuit Inc. | Method and system for providing permissions management |
US9330263B2 (en) | 2014-05-27 | 2016-05-03 | Intuit Inc. | Method and apparatus for automating the building of threat models for the public cloud |
US9473481B2 (en) | 2014-07-31 | 2016-10-18 | Intuit Inc. | Method and system for providing a virtual asset perimeter |
US10102082B2 (en) | 2014-07-31 | 2018-10-16 | Intuit Inc. | Method and system for providing automated self-healing virtual assets |
US9721117B2 (en) | 2014-09-19 | 2017-08-01 | Oracle International Corporation | Shared identity management (IDM) integration in a multi-tenant computing environment |
US10852966B1 (en) * | 2017-10-18 | 2020-12-01 | EMC IP Holding Company, LLC | System and method for creating mapped RAID group during expansion of extent pool |
US10852951B1 (en) * | 2017-10-18 | 2020-12-01 | EMC IP Holding Company, LLC | System and method for improving I/O performance by introducing extent pool level I/O credits and user I/O credits throttling on Mapped RAID |
Citations (4)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
WO2002065309A1 (en) * | 2001-02-13 | 2002-08-22 | Candera, Inc. | System and method for policy based storage provisioning and management |
EP1271296A2 (en) * | 2001-06-28 | 2003-01-02 | InterSan, Inc. | Automated creation of application data paths in storage area networks |
WO2003014911A2 (en) * | 2001-08-10 | 2003-02-20 | Sun Microsystems, Inc. | Method, system, and program for generating and using configuration policies |
US20030061331A1 (en) * | 2001-09-27 | 2003-03-27 | Yasuaki Nakamura | Data storage system and control method thereof |
Family Cites Families (19)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
US5396635A (en) * | 1990-06-01 | 1995-03-07 | Vadem Corporation | Power conservation apparatus having multiple power reduction levels dependent upon the activity of the computer system |
US5287500A (en) * | 1991-06-03 | 1994-02-15 | Digital Equipment Corporation | System for allocating storage spaces based upon required and optional service attributes having assigned piorities |
US6732166B1 (en) * | 1999-05-28 | 2004-05-04 | Intel Corporation | Method of distributed resource management of I/O devices in a network cluster |
US6519679B2 (en) * | 1999-06-11 | 2003-02-11 | Dell Usa, L.P. | Policy based storage configuration |
GB2359153A (en) * | 2000-02-10 | 2001-08-15 | Int Computers Ltd | Device discovery in a shared data storage system |
US7194533B1 (en) * | 2000-04-28 | 2007-03-20 | Microsoft Corporation | System and method for editing active measurements in a client management tool |
US6977927B1 (en) * | 2000-09-18 | 2005-12-20 | Hewlett-Packard Development Company, L.P. | Method and system of allocating storage resources in a storage area network |
US7272613B2 (en) * | 2000-10-26 | 2007-09-18 | Intel Corporation | Method and system for managing distributed content and related metadata |
US6968463B2 (en) * | 2001-01-17 | 2005-11-22 | Hewlett-Packard Development Company, L.P. | System for controlling access to resources in a storage area network |
US7003562B2 (en) * | 2001-03-27 | 2006-02-21 | Redseal Systems, Inc. | Method and apparatus for network wide policy-based analysis of configurations of devices |
EP1250021A1 (en) * | 2001-04-09 | 2002-10-16 | Lucent Technologies Inc. | Providing quality of service in telecommunications systems such as UMTS or other third generation systems |
US6832248B1 (en) * | 2001-05-10 | 2004-12-14 | Agami Systems, Inc. | System and method for managing usage quotas |
US8145784B2 (en) * | 2001-07-30 | 2012-03-27 | Alcatel Lucent | Distributed network management system using policies |
US7133907B2 (en) * | 2001-10-18 | 2006-11-07 | Sun Microsystems, Inc. | Method, system, and program for configuring system resources |
US20040025162A1 (en) * | 2002-07-31 | 2004-02-05 | Fisk David C. | Data storage management system and method |
US7167915B2 (en) * | 2002-10-18 | 2007-01-23 | International Business Machines Corporation | Monitoring storage resources used by computer applications distributed across a network |
US7328259B2 (en) * | 2002-11-08 | 2008-02-05 | Symantec Operating Corporation | Systems and methods for policy-based application management |
US7577729B1 (en) * | 2002-11-26 | 2009-08-18 | Symantec Operating Corporation | Distributed storage management services |
US20040243699A1 (en) * | 2003-05-29 | 2004-12-02 | Mike Koclanes | Policy based management of storage resources |
-
2004
- 2004-07-12 US US10/889,716 patent/US8261037B2/en not_active Expired - Fee Related
- 2004-07-12 EP EP04778240A patent/EP1652042A4/en not_active Ceased
- 2004-07-12 WO PCT/US2004/022635 patent/WO2005008439A2/en active Application Filing
Patent Citations (4)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
WO2002065309A1 (en) * | 2001-02-13 | 2002-08-22 | Candera, Inc. | System and method for policy based storage provisioning and management |
EP1271296A2 (en) * | 2001-06-28 | 2003-01-02 | InterSan, Inc. | Automated creation of application data paths in storage area networks |
WO2003014911A2 (en) * | 2001-08-10 | 2003-02-20 | Sun Microsystems, Inc. | Method, system, and program for generating and using configuration policies |
US20030061331A1 (en) * | 2001-09-27 | 2003-03-27 | Yasuaki Nakamura | Data storage system and control method thereof |
Non-Patent Citations (2)
Title |
---|
CHESS D M ET AL: "The vision of autonomic computing" COMPUTER, IEEE SERVICE CENTER, LOS ALAMITOS, CA, US, vol. 36, no. 1, 1 January 2003 (2003-01-01), pages 41-50, XP011095404 ISSN: 0018-9162 * |
See also references of WO2005008439A2 * |
Also Published As
Publication number | Publication date |
---|---|
EP1652042A4 (en) | 2009-03-04 |
WO2005008439A2 (en) | 2005-01-27 |
US20050193231A1 (en) | 2005-09-01 |
WO2005008439A3 (en) | 2005-06-02 |
US8261037B2 (en) | 2012-09-04 |
Similar Documents
Publication | Publication Date | Title |
---|---|---|
US8261037B2 (en) | Storage self-healing and capacity planning system and method | |
US7774444B1 (en) | SAN simulator | |
US7401338B1 (en) | System and method for an access layer application programming interface for managing heterogeneous components of a storage area network | |
US10140045B2 (en) | Control device for storage system capable of acting as a constituent element of virtualization storage system | |
US7203730B1 (en) | Method and apparatus for identifying storage devices | |
US7711979B2 (en) | Method and apparatus for flexible access to storage facilities | |
US7133907B2 (en) | Method, system, and program for configuring system resources | |
US9047481B2 (en) | Hierarchical multi-tenancy management of system resources in resource groups | |
US7107328B1 (en) | Storage area network (SAN) device logical relationships manager | |
US7577729B1 (en) | Distributed storage management services | |
US8291429B2 (en) | Organization of heterogeneous entities into system resource groups for defining policy management framework in managed systems environment | |
US8051262B2 (en) | Storage system storing golden image of a server or a physical/virtual machine execution environment | |
US20030135609A1 (en) | Method, system, and program for determining a modification of a system resource configuration | |
US20030033398A1 (en) | Method, system, and program for generating and using configuration policies | |
US20060190611A1 (en) | Access management method between plural devices constituted by hierarchical relation, management computer, and computer system | |
US20030033346A1 (en) | Method, system, and program for managing multiple resources in a system | |
US20080016311A1 (en) | SAN/NAS integrated management computer and method | |
US8495294B2 (en) | Management computer for managing storage system capacity and storage system capacity management method | |
KR20000076955A (en) | Storage domain management system | |
JPH09502035A (en) | Computer network with reliable and efficient removable media services | |
US9495486B1 (en) | Methods and apparatus for SAN environment simulation | |
US7346685B2 (en) | Method and apparatus for limiting management operation of a storage network element | |
US7533169B1 (en) | Object-driven visualization mechanism for zoning information on a storage area network | |
US7272848B1 (en) | Method for device security in a heterogeneous storage network environment | |
US20070112868A1 (en) | Storage management system and method |
Legal Events
Date | Code | Title | Description |
---|---|---|---|
PUAI | Public reference made under article 153(3) epc to a published international application that has entered the european phase |
Free format text: ORIGINAL CODE: 0009012 |
|
17P | Request for examination filed |
Effective date: 20060210 |
|
AK | Designated contracting states |
Kind code of ref document: A2 Designated state(s): AT BE BG CH CY CZ DE DK EE ES FI FR GB GR HU IE IT LI LU MC NL PL PT RO SE SI SK TR |
|
RIC1 | Information provided on ipc code assigned before grant |
Ipc: G06F 12/00 20060101AFI20060330BHEP |
|
DAX | Request for extension of the european patent (deleted) | ||
A4 | Supplementary search report drawn up and despatched |
Effective date: 20090129 |
|
RIC1 | Information provided on ipc code assigned before grant |
Ipc: G06F 12/00 20060101AFI20060330BHEP Ipc: H04L 12/24 20060101ALI20090123BHEP Ipc: H04L 29/08 20060101ALI20090123BHEP Ipc: G06F 3/06 20060101ALI20090123BHEP |
|
17Q | First examination report despatched |
Effective date: 20090619 |
|
REG | Reference to a national code |
Ref country code: DE Ref legal event code: R003 |
|
STAA | Information on the status of an ep patent application or granted ep patent |
Free format text: STATUS: THE APPLICATION HAS BEEN REFUSED |
|
18R | Application refused |
Effective date: 20160621 |